Keys to Your Kingdom – Held Hostage
After 35 years in the IT industry, I have seen a widest variety of IT environments and met so many IT people. Some good, some
What is MFA?
If technology wasn’t confusing enough for most people, ransomware and cybersecurity are compounding the problem. Employees are required to know how to identify “fake” emails
Surf securely with a VPN
There was a time when installing an antivirus program was enough to secure your data, but that’s no longer the case today. Whether you want
What is proactive cybersecurity, and how do you implement it?
To keep cyberthreats at bay, you need proactive cybersecurity solutions in your arsenal. They identify and contain threats before they wreak havoc on your systems
What’s new in cybersecurity?
ZERO! Well, that is “zero trust”, I mean. We humans are so trusting. We trust our parents, our teachers, our clergy, our scientists, and even
Helpful tips for keeping your email safe
People rely on email to do a wide array of tasks. We use it to sign up for websites, apply for jobs, make payments, get
Your password may not be secure — update it now
The National Institute of Standards and Technology (NIST) once said that a good password consisted of three things: upper- and lowercase letters, numbers, and symbols.
Shopping for antivirus software? Consider the following points
As viruses, ransomware, and spyware become more dangerous these days, it’s more important than ever to have powerful antivirus protection. When choosing the right antivirus
How to strengthen your BYOD security
Many businesses are adopting bring your own device (BYOD) policies as more employees work from home. The problem is, if you’re not careful, BYOD can